Linked Presentation: A comprehensive, formal and automated analysis of the EDHOC protocolHash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknessesFormal Analysis of Session-Handling in Secure Messaging: Lifting Security from Sessions to ConversationsAutomated Analysis of Protocols that use Authenticated Encryption: How Subtle AEAD Differences can impact Protocol Security